DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6a7b2127f51b746bb420b669f58387dd_JaffaCakes118.dll
Resource
win7-20240708-en
Target
6a7b2127f51b746bb420b669f58387dd_JaffaCakes118
Size
473KB
MD5
6a7b2127f51b746bb420b669f58387dd
SHA1
103dd5634e0c5814decd0cff1117ec5c32edea1b
SHA256
5ce4ce0d34175abf9618a5d2b9d3002c06de5218ee7b2664ffd98884fd1a8d1d
SHA512
921068de7ccc7b8053c896edb08a9ebac10c53822337ded91f4902272c76612ea8adbc064c506feed807bb8d8f6274d3a61618b6c27c1218d6d2f8d30f6d6122
SSDEEP
12288:Mc4sMuOMnU/IhvfaoBipekvQGTeJjBTAk:ZpMRVekvQGTeJjBTA
Checks for missing Authenticode signature.
resource |
---|
6a7b2127f51b746bb420b669f58387dd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
LoadLibraryW
GetProcAddress
lstrlenW
WideCharToMultiByte
GetLastError
lstrcmpiW
MultiByteToWideChar
GetModuleHandleW
RaiseException
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetThreadLocale
SetThreadLocale
FindResourceW
CreateFileW
WriteFile
CloseHandle
WinExec
OpenProcess
lstrlenA
GetExitCodeThread
Sleep
TerminateThread
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
GetLocaleInfoW
IsValidCodePage
LockResource
LoadResource
SizeofResource
FreeLibrary
LoadLibraryExW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetWindowsDirectoryW
InitializeCriticalSection
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
GetFileType
VirtualAlloc
FatalAppExitA
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
HeapSize
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
LCMapStringA
RtlUnwind
LoadLibraryA
InterlockedExchange
SetConsoleCtrlHandler
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
HeapFree
HeapReAlloc
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CharLowerW
PostMessageW
CharLowerA
CharNextW
UnregisterClassA
MessageBoxW
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
UnRegisterTypeLi
SysAllocStringLen
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarBstrCat
VariantClear
RegisterTypeLi
VarBstrCmp
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrStubForwardingFunction
NdrOleAllocate
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrDllCanUnloadNow
IUnknown_Release_Proxy
NdrCStdStubBuffer2_Release
IUnknown_AddRef_Proxy
NdrDllGetClassObject
NdrDllUnregisterProxy
InternetCrackUrlW
InternetGetCookieW
InternetSetCookieW
InternetCloseHandle
InternetOpenW
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
CoInternetGetSession
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ